Model for assessing the efficiency of information security systems functioning in interdependent critical infrastructures

Authors

DOI:

https://doi.org/10.18372/2073-4751.72.17457

Keywords:

critical infrastructure, interdependent critical infrastructures, critical infrastructure objects, efficiency, efficiency evaluation model, investment optimization, security level

Abstract

Today, the critical infrastructures of nations differ significantly from one another in different countries, but the indisputable unifying factor is the close relationship and complex interdependence of a multitude of information and communication technologies. The security of our country, as well as the quality of life of its citizens, depends on the continuous reliable operation of a complex of interdependent infrastructures, including transportation, electricity, oil, gas, telecommunications and emergency services. And a failure in one infrastructure can quickly and significantly affect another. Modern infrastructures are almost completely dependent on new information technologies and the Internet, and often for their reliable operation they need to be connected to each other through electronic, informational communications. And while these technologies allow for huge gains in efficiency, they also create new vulnerabilities. Thus, there is a need to develop new models and methods to ensure the stable functioning of interdependent critical infrastructures (ICI). The paper presents a model for assessing the effectiveness of IS systems functioning, which, due to the representation of ICI in the form of Markov and semi-Markov processes, introduction of changes in the state space and transition matrix, allows to optimize costs and investments in the IS system while simultaneously ensuring a given level of its security. In addition, an experimental study of the proposed model was conducted. The use of this model makes it possible to comprehensively evaluate the main indicators of investment in ensuring the security of ICI of the state, taking into account budgetary restrictions on the total costs incurred.

References

Nozick L., Turnquist M., Jones D., Davis J., Lawton C. Assessing the Performance of Interdependent Infrastructures and Optimizing Investment. Proceedings of the 37th Hawaii International Conference on Systems Sciences, Jan. 2004.

Xu N., Nozick L.K., Turnquist M.A., Jones D.A. Optimizing Investment for Recovery in Interdependent Infrastructure, 2007. 40th Annual Hawaii International Conference on System Sciences (HICSS'07), Waikoloa, HI, USA, 2007. – Р. 112-112.

Boyer, Stuart A. SCADA Supervisory Control and Data Acquisition. – USA: ISA – International Society of Automation, 2010. – 179 р.

Abbas H.A., Mohamed A.M. Review in the design of web based SCADA systems based on OPC DA protocol. International Journal of Computer Networks, February, 2011. – Vol. 2. – No. 6. – Р. 266-277.

Rinaldi S., Peerenboom J., Kelly T. Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine, 11- 25, December 2001.

Mussington D. Concepts for Enhancing Critical Infrastructure Protection: Relating Y2K to CIP Research and Development. RAND:Science and Technology Institute, Santa Monica, CA, 2002. – 29 р.

Petit F., Wallace K., Phillips J. An Approach to Critical Infrastructure Resilience. The CIP Report, Center for Infrastructure Protection and Homeland Security, George Mason University School of Law, January, 2014. – Vol. 12. – No. 7. – Р. 17-20.

Phillips J.A., Bassett G.W., Buehring W.A., Carlson J.L., Whitfield R.G., Peerenboom J.P. A Framework for Assessing Infrastructure Risk, M4-I Resilience Evaluation Approaches for the Analysis of Complex Systems, Risk Analysis: Advancing Analysis, Society for Risk Analysis, 2012.

Gürkan G., Ozge Y., Robinson S. Sample Path Optimization in Simulation. Proceedings of the 1994 Winter Simulation Conference, December 11-14 1994. – Р. 247-254.

Abbas H.A., Mohamed A.M. Review in the design of web based SCADA systems based on OPC DA protocol. International Journal of Computer Networks, February, 2011. – Vol. 2. – No. 6. – Р. 266-277.

Євсеєв С., Король О. Комплексний показник ефективності інвестицій в безпеку банківської інформації на основі синергетичної моделі загроз. VI Міжнародна наукова конференція “Інформація, комунікація, суспільство 2017”, Славське, 2017. – С. 18-19.

Євсеєв С.П. Методологія побудови системи безпеки банківських інформаційних ресурсів. Кваліфікаційна наукова праця на правах рукопису. – К.: НАУ, 2018.

Limnios N., Oprisan G. Semi-Markov Processes and Reliability. – Birkhäuser, Boston, 2001.

Published

2022-12-15

Issue

Section

Статті